employee data

Results 1 - 25 of 324Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA
Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no one’s data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations’ vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : 
encryption, data, key, cloud, bits, keys, ciphertext, entropy, plaintext, software
    
Rubrik EMEA
Published By: Forcepoint     Published Date: Jun 06, 2019
As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. In the past, DLP has been associated with complicated deployments and pervading operational management issues, yet DLP is not so much a product but a strategy—success depends on methodology and execution. Download the whitepaper for insightful guidance on implementing DLP. Key topics include: • Latest data-breach trends • Assessing DLP vendors • Nine-step framework • Best practices to ensure success
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Things aren't what they used to be in the enterprise. Your employees are mobile and they're storing and accessing data in cloud apps—often in disparate networks. That presents a serious challenge for old-school threat-centric security models that force you to make decisions with little insight or broader context. Download our eBook to find out how a human-centric, risk-adaptive approach to data security can free up your overwhelmed security team to focus on investigations that really matter.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property without impacting an employee’s ability to do their job. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s risk and the sensitivity or value of the data. An organization’s data protection program must consider the human point — the intersection of users, data and networks. Enterprises must remain vigilant of data as it moves across hybrid environments and highlight the users who create, touch and move data who may pose the greatest risk to an organization.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Today’s employees demand greater flexibility, productivity, and mobility. And while cloud and BYOD policies have answered that call, they’ve also added unforeseen complexities the way IT manages data security and compliance. How can you balance productivity and risk in SaaS environments? “A Guide to Achieving SaaS Security and Compliance” deconstructs the idea that cloud security and user productivity are mutually exclusive. This whitepaper includes guidance on how to: Select SaaS providers that follow the very same external standards (e.g., PCI DSS) as your organization. Apply the same in-house security, governance, and compliance principles to cloud services. Leverage tools and processes to gain visibility, control access, and protect data in your SaaS environment.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Office 365, Salesforce, and other cloud apps deliver a boost in employee productivity, but this benefit comes at a price. Once data moves outside an enterprise, security teams lose visibility and control into how it’s accessed and used. There is also the risk of unsanctioned apps or Shadow IT – the cloud apps setup and managed outside of IT that they have no visibility of; all this leaves an organization having to manage up to 1,000 cloud apps*.  Deploying a CASB solution can help you discover and assess risk from unsanctioned cloud apps and control sanctioned cloud app use. Through a hands-on evaluation, ESG discovered that Forcepoint CASB: Reduces threat response times Grants visibility and context into user activity Controls user access to cloud apps from different locations/devices Read the ESG evaluation for rare insight into Forcepoint CASB by a respected third-party analyst.
Tags : 
    
Forcepoint
Published By: Citrix Systems     Published Date: Jun 04, 2019
As companies scale, they add solutions leaving employees having to deal with multiple gateways or access points to get to their applications, apps, and data. It creates a poor user experience, slows productivity, and opens organizations to security risks. With Citrix Workspace, IT is able to simplify connections with remote access while maintaining security and control. Download our e-book and find out how we can: Provide users with one access point and single sign-on (SSO) Ensure secure access to apps in the data center, cloud, or delivered as SaaS applications across any device Help IT reduce complexity and meet compliance and security policies
Tags : 
    
Citrix Systems
Published By: AWS     Published Date: Jun 07, 2019
With more data to analyze than ever before, companies are finding new ways to quickly find meaning in their data with artificial intelligence (AI). Natural Language Generation (NLG) technologies deployed on Amazon Web Services (AWS) can enable organizations to free their employees from manual data analysis and interpretation tasks. NLG transforms data into easy-to-understand, data-driven narratives with context and relevance.
Tags : 
    
AWS
Published By: AppAssure Software     Published Date: Jul 14, 2010
All those employees who access email, financial systems, human resources, and other core corporate applications; Replay for Exchange continuously protects and monitors the health of your Exchange data stores and allows administrators to quickly search, recover, and analyze mailbox content. With Replay for Exchange you can restore individual email messages, folders, or mailboxes to a live Exchange server or directly to a PST, thereby solving some of your most costly and time consuming challenges. Take advantage of these Free Trial Offer!!
Tags : 
appassure, sql, hyper-v, windows, vmware, replay, windows server, application server, disaster recovery
    
AppAssure Software
Published By: Ricoh     Published Date: Mar 11, 2019
Today’s CIOs no longer just oversee technology. They are now key strategists who guide their organizations and give them the tools they need to stay competitive. A study by Forbes Research stated that five years ago, a CIO’s most critical skill was deploying technology. Now, the #1 way that CIOs provide value is by contributing to the corporate strategy, so they can advance business objectives and drive revenue.1 In particular, CEOs rely on the CIO for guidance around digital transformation. Organizations must transform how they operate and take advantage of new technologies to better engage customers and employees. Digital transformation falls squarely on the shoulders of IT leaders. CIOs are under pressure to drive transformation – overcoming barriers such as cultures that are resistant to change, employees who want to upload files anywhere, and increased concerns about data security. CEOs also expect CIOs to achieve results now. The longer you wait, the more likely you will fall beh
Tags : 
    
Ricoh
Published By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard
Published By: QTS     Published Date: Nov 04, 2016
At the heart of the Data Solved promise are three core attributes - People Powered, Technology Focused and Infrastructure Invested. We leverage our strong, diverse team of more than 700 employees to enable our Powered by People motto and deliver on our promise. With 24 data centers on four continents, we are poised to deliver world-class infrastructure and value added technology services to our more than 1,000 customers in North America, Europe, Asia and Australia.
Tags : 
data centers, infrastructure, value added technology services, data security, data center, colocation, cloud needs
    
QTS
Published By: Cisco     Published Date: Dec 11, 2018
The most significant IT transformation of this century is the rapid adoption of cloud-based applications. Most organizations are now dependent on a number of SaaS and IaaS platforms to deliver customer satisfaction and empower employee productivity. IT teams are responsible for delivering a high quality user experience for cloud applications while they struggle to manage a secure environment with advanced persistent threats. The WAN is the fabric to connect and control access between remote users and cloud-based applications. The WAN fabric needs to identify application type, location, apply prioritization and route traffic across the appropriate (multiple) WAN links to deliver on user experience. Different types of users/devices connecting to the cloud (via the Internet) means security policies must be enforced at branch, data center and in the cloud.
Tags : 
    
Cisco
Published By: Cisco EMEA     Published Date: Mar 05, 2018
The operation of your organization depends, at least in part, on its data. You can avoid fines and remediation costs, protect your organization’s reputation and employee morale, and maintain business continuity by building a capability to detect and respond to incidents effectively. The simplicity of the incident response process can be misleading. We recommend tabletop exercises as an important step in pressure-testing your program.
Tags : 
human resources, cisco, employees, data, analysis
    
Cisco EMEA
Published By: SAP     Published Date: Nov 17, 2016
Culture has become one of the most important business topics of 2016. CEOs and HR leaders now recognize that culture drives people's behavior, innovation, and customer service: 82 percent of survey respondents believe that "culture is a potential competitive advantage." Knowing that leadership behavior and reward systems directly impact organizational performance, customer service, employee engagement, and retention, leading companies are using data and behavioral information to manage and influence their culture.
Tags : 
sap, human resources, employee, deloitte, culture
    
SAP
Published By: Spectrum Enterprise     Published Date: Jun 05, 2019
The success of every business is driven by the quality of its connections, whether with clients, employees, investors, suppliers, manufacturers or other key stakeholders. Increasingly, these relationships are measured through data-driven analytics, enhanced through video communication, and empowered through cloud computing and collaboration. As the volume of data grows, so do bandwidth requirements.
Tags : 
    
Spectrum Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Digital transformation (DX) is a must for midsize firms (those with 100 to 999 employees) to thrive in the digital economy. DX enables firms to increase competitive advantage through initiatives such as automating business processes, creating greater operational efficiencies, building deeper customer relationships, and creating new revenue streams based on technology-enabled products and services. DX is a journey, and it starts with firms embracing an IT-centric vision that guides a data-driven, analytics-first strategy. The outcome of DX initiatives depends on the ability of a firm to efficiently leverage people (talent), process, platforms, and governance to meet the firm’s business objectives.
Tags : 
    
Hewlett Packard Enterprise
Published By: Sage     Published Date: Nov 26, 2018
Do you know your people as well as you know your customers? Your people’s expectations and the way they work are changing. Employees are more diverse, mobile and technologically savvy than ever before. HR processes are changing from focusing on transactions to knowing and engaging people. Just as sales and marketing teams use data to develop actionable and informed insights about their customers, you need to do the same in HR to know your people. Everything from attracting and keeping the best talent to creating better workplace experiences and increasing employee engagement and productivity, depends on smarter decisions. These in turn rely on more actionable insights. These are only possible through accurate HR data and analytics. They are vital to address the people challenges you face, so you can make smarter decisions. Discover in this guide how to improve visibility of your workforce with data-driven and actionable insights. Ultimately, it will help you know your people better and
Tags : 
    
Sage
Published By: Commvault     Published Date: Jul 06, 2016
Email is the backbone of today’s corporate business processes. It lives as the primary communication vehicle internally between employees and externally with customers, vendors, partners and investors. It is arguably today’s most pervasive and critical business application within which is stored the most valuable business content. To protect this vital information while working to eliminate risk, lower management costs and improve business insight, companies require a comprehensive email archiving solution. This solution should not only work to effectively retain email information in a searchable repository, the best email archiving solutions also provide a smarter approach to collecting, retaining and accessing data so that it can deliver true business value.
Tags : 
commvault, email archiving, data protection, email archiving solution, mailbox archiving, reduce bloat, o365
    
Commvault
Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint, end user recovery, control governance
    
Commvault
Published By: ADP     Published Date: Jun 01, 2018
The Marcus Buckingham Company, an ADP Company, commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying StandOut. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of StandOut on their organizations. To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed several customers with experience using StandOut. StandOut is an integrated suite that pairs a technology platform with coaching to help organizations achieve their talent activation goals. Prior to using StandOut, the interviewed organizations did not have a structured program to improve and measure employee engagement and performance. Organizations used annual surveys and annual performance reviews, and some even encouraged weekly check-ins, but there was no guidance on how to complete these tasks, and the data t
Tags : 
    
ADP
Published By: Rosetta Stone     Published Date: Jan 23, 2018
With global opportunities on the rise,. having a multilingual workforce has become a critical market success factor. Language proficiency and awareness of a market's culture, local customs, and business traditions conveys respect for customers and colleagues, which leads to greater trust and improved business results. Businesses are providing language-learning resources that prepare employees to engage in these markets. Forbes Insights and Rosetta Stone surveyed 200+ executives globally to understand the impact of language training on companies and employees. Read this guide to learn the key themes and data from the report.
Tags : 
    
Rosetta Stone
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.